Visible to the public Biblio

Filters: Keyword is high risk network flows  [Clear All Filters]
2015-05-01
Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S..  2014.  Provenance-aware security risk analysis for hosts and network flows. Network Operations and Management Symposium (NOMS), 2014 IEEE. :1-8.

Detection of high risk network flows and high risk hosts is becoming ever more important and more challenging. In order to selectively apply deep packet inspection (DPI) one has to isolate in real time high risk network activities within a huge number of monitored network flows. To help address this problem, we propose an iterative methodology for a simultaneous assessment of risk scores for both hosts and network flows. The proposed approach measures the risk scores of hosts and flows in an interdependent manner; thus, the risk score of a flow influences the risk score of its source and destination hosts, and also the risk score of a host is evaluated by taking into account the risk scores of flows initiated by or terminated at the host. Our experimental results show that such an approach not only effective in detecting high risk hosts and flows but, when deployed in high throughput networks, is also more efficient than PageRank based algorithms.